Search

Your search keyword '"ANR-22-PECY-0006,SVP,Verification of Security Protocols(2022)"' showing total 17 results

Search Constraints

Start Over You searched for: Author "ANR-22-PECY-0006,SVP,Verification of Security Protocols(2022)" Remove constraint Author: "ANR-22-PECY-0006,SVP,Verification of Security Protocols(2022)"
17 results on '"ANR-22-PECY-0006,SVP,Verification of Security Protocols(2022)"'

Search Results

1. Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses

2. Automated Analysis of Protocols that use Authenticated Encryption: Analysing the Impact of the Subtle Differences between AEADs on Protocol Security

3. A comprehensive, formal and automated analysis of the EDHOC protocol

4. Is the JCJ voting system really coercion-resistant?

5. Belenios with cast as intended

6. Tamarin-based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks

7. Aeneas: Rust Verification by Functional Translation

8. Mechanized Proofs of Adversarial Complexity and Application to Universal Composability: Journal pre-print: full version

9. A Higher-Order Indistinguishability Logic for Cryptographic Reasoning

10. Typing High-Speed Cryptography against Spectre v1

11. Verifiable Decryption in the Head

12. Themis

13. Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol

14. One vote is enough for analysing privacy

15. Proving Unlinkability using ProVerif through Desynchronized Bi-Processes

16. Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co

17. Symbolic protocol verification with dice: process equivalences in the presence of probabilities (extended version)

Catalog

Books, media, physical & digital resources